Home Blog Page 27
Log4Shell, a severe zero-day vulnerability in Apache Log4j library, sheds light on the risky practices of organizations relying on open-source code libraries to build enterprise-scale applications. The remote code execution (RCE) vulnerability CVE-2021-44228 reportedly allows remote hackers to execute arbitrary...
Not all cybercriminal activities are intended to steal credentials. Several threat actor groups often compromise/penetrate social media accounts of public figures such as political leaders, entrepreneurs, and movie actors to show their presence and hacking capabilities. Recently, threat actors...
As we wind down another year and prepare for the next, business leaders and CISOs are thinking about the plans and strategies they want to execute in 2022. CISOs are thinking about security investments and the tools and technologies...
Of the three main IT infrastructure categories — compute, network, and storage — the latter often holds the greatest value, from both security and business perspectives.  SPONSORED CONTENT  Security vulnerabilities and misconfigurations of storage and backup devices present a significant threat, especially...
Restrictions on internet usage and other online products are quite common in Russia. According to a report, the country banned the Tor web anonymity services and six virtual private network (VPN) operators for allowing citizens access to illegal content....
The excitement of obtaining a bargain will soon be driving retail fever with holiday deals fueling online sales across the world. India's e-commerce festive sale season 2020 recorded INR 58,000 crore ($8.3 billion) worth of gross sales for brands...
Threat actors often prey on vulnerable devices to break into targeted networks. With most employees working remotely, cybercriminals increased their hacking attempts targeting vulnerable commercial IoT devices like Wi-Fi routers. Recently, a security research report from Eclypsium revealed that...
As more criminals turn to online scams to steal your confidential data, phishing prevention has become critical. We now know what spam emails are and have learned to ignore them, but phishing emails can appear to be legitimate. They...
Organizations that use services of mainstream software providers continue to face trust issues amid the increase in supply chain and ransomware attacks, a recent report from CrowdStrike revealed. The 2021 CrowdStrike Global Security Attitude Survey report stated that nearly 63% of...
Mid-November 2021 saw the Emotet botnet resurface and was widely reported. The botnet had been taken down by law enforcement agencies in January 2021 and had been inactive since then. In the latest update, it has been reported that Emotet...